California Governor Jerry Brown has signed Senate Bill 819, which will allow law enforcement officers to take more firearms out of the hands of those who are prohibited from owning them.
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy.
The Academy of Art University in San Francisco has evolved from a loft studio for a handful of students in 1929 to become the country’s largest private school for art and design. The family-run institution understands that parents want to be assured that their children are in a safe and secure environment. Academy President Elisa Stephens, the granddaughter of the school's founder, Richard S. Stephens, has committed the academy to an ever-expanding curriculum in order to stay current with new technologies and trends. Roving patrols that provide security are as much a part of the academy’s philosophy as its commitment to being “student-centric,” meaning staff members will do what they need to do to benefit the students. On a day-to-day basis, the academy’s security team makes the decisions that will affect positive outcomes for student security. This includes video surveillance, campus safety hosts at buildings and desk guards in buildings where students must be buzzed-in to enter.
- By Mary Wilbur
- Oct 11, 2011
More and more companies are providing their employees with smartphones. While companies seek the best security available for their data, employees would also like to install apps of their own. Security experts have now developed equipment software with two separate areas: the business area and the personal area.
Seriously folks, weapons of all kinds are not wanted at the airport. Any airport.
- By Ralph C. Jensen
- Oct 07, 2011
Fingerprints are a valuable identification tool for everything from crime detection to international travel. But what happens when the tips of our fingers are missing those distinctive patterns of ridges?
Dismounted warfighters often carry 100 pounds or more of equipment as they patrol for hours across rugged or hilly terrain. This heavy load increases the risk of musculoskeletal injury, particularly on vulnerable areas such as knees, ankles and the spine.
A research team at Michigan State University has developed a laser that could detect roadside bombs.
NASA scientists are creating technology that can detect hazardous chemical compounds in the air with a smart phone.
ONVIF, provider of standardization initiatives for IP-based physical security products, recently announced that it has released a new set of tools designed to aid member companies in designing and releasing new ONVIF conformant products to the physical security market.
As cities across California struggle with how to handle medical marijuana dispensaries and police agencies blame them for an increase in lawlessness, academics are delving into data to find out whether pot shops really do influence neighborhood crime.
While computing changes constantly, most shifts are simple changes that don’t require organizations to change the core of how they work. Not so with cloud computing. While promising significant benefits, it requires organizations to change how they approach IT.
ASSA ABLOY has packed up its latest door and hardware products and opening solutions into the Mobile Innovation Showroom and is touring the country.
The company has hired Brian Ashley and Roy Wake as its new regional sales managers.
Bosch Security Systems provides Rio de Janiero with state-of-the-art surveillance technology for Brazil's Rock in Rio Festival.
NAV will provide service for more than 300 locations across seven states.
Vector Security's new National Service Center provides additional space, technology review labs and increased customer communications.
The additions include Werner Gartner, CFO, Joe Haar, vice president of sales and Hussein Amery, vice president of business development.
McAfee recently released the results of a survey conducted by Gabriel Consulting Group (GCG), an independent analyst firm, showing a serious disconnect between security perceptions and reality among IT Enterprise security managers.
The company will donate a portion of the proceeds to the Pink Ribbon Foundation for every limited edition printer sold.
Levitch has spent the last 20 years in the security/access control industry, including recent stops at S2 and VEREX.
The Austin Police Department caught a burglar thanks to one man’s home security system. Homeowner Thomas Marik received a startling phone call from his wife one August afternoon only to find out that the couple’s home was burglarized. Marik and his wife were out for the day only to come home to find their house broken in. The couple never experienced a burglary before in their Austin, Texas, neighborhood, but they were prepared.
- By Christina Miralla
- Oct 03, 2011
While campus security is obviously a key concern, an integrated security solution can provide an educational institution with additional value.
- By Shan Bates
- Oct 03, 2011
Seneca 's xVault server is optimized for use with Ocularis, OnSSI's flagship video surveillance software.
What’s up with the TSA these days? Have you noticed that officers are acting a little nicer and even asking questions about you, your travel or maybe even your job? Don’t be fooled: It’s all an act, because it’s business as usual at the airports.
- By Ralph C. Jensen
- Oct 01, 2011
Organizations of all sizes are migrating from analog to IP-based physical access control solutions, drawn by increased security, increased operational efficiency and better availability.
- By Dan O’Malley
- Oct 01, 2011
Most security professionals know that wireless systems remove the expense of running wire to all access points, a project that takes too much time and wreaks havoc throughout the facility while the job is being done.
- By Sean Leonard
- Oct 01, 2011
Providing security in the government sector is not for the faint of heart or the uncommitted. The government sector requires expertise in high-level security applications, advanced compliance requirements and the challenge of securing funding.
- By Dan Myslewski
- Oct 01, 2011